Select Page

Word of the Week

Email coexistence

Week 29:Email coexistence Email coexistence enables organizations with on-premises Exchange Server email environments to establish a connection between their on-premises mail environment and the Office 365 Exchange Online mail environment. With coexistence configured,...

Authentication

Week 28:Authentication This is the process of determining whether someone or something is, in fact, who or what it is declared to be. Authentication is commonly performed through the use of user name and logon passwords.

Active Directory Federation Services (AD FS):

Week 27:Active Directory Federation Services (AD FS): AD FS provides the various end-points that the Microsoft Federation Gateway uses to redirect clients to the AD FS server for different types of authentication. AD FS must be installed on a separate physical server...

Gnutella

Week 26: Gnutella An Internet file sharing utility. Gnutella acts as a server for sharing files while simultaneously acting as a client that searches for and downloads files from other users.

Zombies

Week 25: Zombies A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many ina botnet, and will be used to...

Smurf

Week 24: Smurf The Smurf attack works by spoofing the target address and sending a ping to the broadcast address for a remote network, which results in a large amount of ping replies being sent to the target.

Secure Shell (SSH)

Week 23: Secure Shell (SSH) A program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.

Kernel

Week 22: Kernel The essential center of a computer operating system, the core that provides basic services for all other parts of the operating system. A synonym is nucleus. A kernel can be contrasted with a shell, the outermost part of an operating system that...

S/Key

Week 21: S/Key A security mechanism that uses a cryptographic hash function to generate a sequence of 64-bit, one-time passwords for remote user login. The client generates a one-time password by applying the MD4 cryptographic hash function multiple times to the...

Null Session

Week 20: Null Session Known as Anonymous Logon, it is a way of letting an anonymous user retrieve information such as user names and shares over the network or connect without authentication. It is used by applications such as explorer.exe to enumerate shares on...

Netmask

Week 19: Netmask 32-bit number indicating the range of IP addresses residing on a single IP network/subnet/supernet. This specification displays network masks as hexadecimal numbers. For example, the network mask for a class C IP network is displayed as 0xffffff00....

DDoS

Week 18: DDoS An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).